Updated packages that disable SSLv2/3 usage are now availablefor Red Hat Enterprise MRG 2.5 for Red Hat Enterprise Linux 6.

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generationIT infrastructure for enterprise computing. MRG offers increasedperformance, reliability, interoperability, and faster computing forenterprise customers.These updated packages address a vulnerability in the SSLv3 protocols,which is commonly referred to as POODLE. POODLE stands for Padding Oracle OnDowngraded Legacy Encryption. This vulnerability allows a man-in-the-middleattacker to decrypt ciphertext using a padding oracle side-channel attack. POODLE affects older standards of encryption, specifically Secure Socket Layer(SSL) version 3. It does not affect the newer encryption mechanism knownas Transport Layer Security (TLS). As such, these updated packages implement therecommended action to disable SSLv3 in the C++ broker (qpid-cpp),Windows C++ client (qpid-qmf), Java client (qpid-java), and cumin (cumin).All users of Red Hat Enterprise MRG 2.5 for Red Hat EnterpriseLinux 6 are advised to upgrade to these updated packages, which correctthis issue.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6)

SRPMS:
cumin-0.1.5797-5.el6.src.rpm
    MD5: 1ec08d5af7eb2cf7b0e21c173919a7a0SHA-256: 2854992e98c1c3e4943b0385e93a8a2b5c1f68d5f03174c19a95e1ceae8f434a
qpid-cpp-0.18-36.el6.src.rpm
    MD5: 812e27072db329fa72f505007b6f65c2SHA-256: 036e7adc713855bea39a28ba6374fb3d3bd8e902aec11625ecaedd497dd975c8
qpid-java-0.18-9.el6.src.rpm
    MD5: 9ffe0730b48ea3f39a5b3ece177cf38dSHA-256: 1226fa88a7ed4fa1450d16ba90bdbd2cad945036af23cea041ecc92b17de03f8
qpid-qmf-0.18-29.el6.src.rpm
    MD5: 9ae28897f98c2e465e92cb90420276eeSHA-256: ec182835e9d672f3504fcbd060aa8a43ce6c8f308aa1e192172c71ac512c2b25
 
IA-32:
cumin-0.1.5797-5.el6.noarch.rpm
    MD5: e9cd4889ff1a8b39a94e8d7e7e13d5b9SHA-256: 8be9b500a9a453f4dc286fdbae946a8ba7bd1df32527fadeb581152b1e721693
python-qpid-qmf-0.18-29.el6.i686.rpm
    MD5: fecc5f0e1b090cf0986b25db7236d29aSHA-256: 9a01bdb06960c3eb7dd0bc88d9ee93a4facf5c30c34197f324ba8d4a39ff6f11
qpid-cpp-client-0.18-36.el6.i686.rpm
    MD5: cbb782d6b5472171d34dfe0753af1e7eSHA-256: 4bdcd7200fc4fe88d1e762d9e0595cffa43fe2ee1579caf1168d5c0ba6ace83e
qpid-cpp-client-devel-0.18-36.el6.i686.rpm
    MD5: 49751d2186617c08cbf248661a0908f5SHA-256: d6789ec819adf88c7d4d725771e65a20a682a0e005864312d9b9a4323f88f99d
qpid-cpp-client-devel-docs-0.18-36.el6.noarch.rpm
    MD5: 128c236eda396961ceb91518be735826SHA-256: 452193f99fc0ec50267494763a3a9706067556247f826ac56603403d9621752e
qpid-cpp-client-rdma-0.18-36.el6.i686.rpm
    MD5: 2e4551b4d9a13b63a0d92e5272bdb545SHA-256: 7f8460e128e1f1f309a96e87f0cc15407776cc66974839377e1441b6e170cff9
qpid-cpp-client-ssl-0.18-36.el6.i686.rpm
    MD5: c802ad47e3d9102fdcd104fe9ffec898SHA-256: 3b5f26ffdfeb419b685fc2c587ad29969dc545b81aa7f3e77916ade932f4621e
qpid-cpp-debuginfo-0.18-36.el6.i686.rpm
    MD5: d816a5975e747448b23d27eef7bacc17SHA-256: 7e6a632a86d1fb4b29e37643ca8b16060de95af00d5771ecd6ee31493afbce6f
qpid-cpp-server-0.18-36.el6.i686.rpm
    MD5: c317ac861bb1877fad3c899a543260ddSHA-256: 23fce3bdd6319becd0463c8d3f732b6c3a2fdae494bacaa13b43eef7b968680b
qpid-cpp-server-cluster-0.18-36.el6.i686.rpm
    MD5: 5e4342fd4ffc137272c2edcc76b65259SHA-256: 1bdf41957be43044239aa0c4a8a7292dd9b5a7483eec4c315aa2c2886dad5d00
qpid-cpp-server-devel-0.18-36.el6.i686.rpm
    MD5: 353739412f2ec89b6a3db6fad70c30cbSHA-256: 6b1bd72b221c1ccb2ae09128769d227a7116371b504cb25417be8a7ab8c9002e
qpid-cpp-server-rdma-0.18-36.el6.i686.rpm
    MD5: c58ad85e724329ba5f757d4a28ee571bSHA-256: e2af0d2189af5283f40068641671cefd3aa80cc6720a72e6a74b1973a6d1d9f7
qpid-cpp-server-ssl-0.18-36.el6.i686.rpm
    MD5: 5c839b863d215034751e3db66f57c642SHA-256: 7c4ac8b2784edb02754d128b69779fbdb78f8ca1d8eaaa2a68fd6a62a65e0d8c
qpid-cpp-server-store-0.18-36.el6.i686.rpm
    MD5: f87b2e961b52bc89afcda7bc55cd6c71SHA-256: d208577e754225f3c48e55dbfd5b36a0d3dc3b30cf01787b9fc04964c12c31f7
qpid-cpp-server-xml-0.18-36.el6.i686.rpm
    MD5: abe1f30f6764089d3c0ea405cfc71afdSHA-256: 593e8754f18e3aa95bbea4df536728a4e8ca8ddfba1b9ff3089d6dc94e7d2a2c
qpid-java-client-0.18-9.el6.noarch.rpm
    MD5: 767278d0189444442270ef2c2a2509e8SHA-256: de2214482fb3487ce0635ffc9ac84634e0a0bdf5b809b2a5c5349402a751352b
qpid-java-common-0.18-9.el6.noarch.rpm
    MD5: 997017707e3f82587c0fc1d7f1a34053SHA-256: 2cab5347474aee2c1d6f2ae1b804cafc12a813a69a514e40b35e3ed905b0e447
qpid-java-example-0.18-9.el6.noarch.rpm
    MD5: 3815c6c77727612c560dace918cac543SHA-256: 01b53244d9767c4c7d70dbed0a35e6a3acde286b8df707582d1676c8ba6040eb
qpid-qmf-0.18-29.el6.i686.rpm
    MD5: b04881ba73e425dd13d6fbe117d4d6f8SHA-256: 5636dd5db3b8a03d5dd486d3a29bcfe17a0a70d0340f44bfee0ebe7f11e4f27a
qpid-qmf-debuginfo-0.18-29.el6.i686.rpm
    MD5: 076218aca8c1a522c991c3f5d86e270dSHA-256: 4c7b96711301782bf64d5ab8449fb1068b7b21de21b28f6730a37b5a97258de2
qpid-qmf-devel-0.18-29.el6.i686.rpm
    MD5: baf0b0d4a96fd90d6a949046a7d39005SHA-256: 95709fc93bf21aeab68f551766c12589cf78192d9dbf50f839e61c97b6b10f8f
ruby-qpid-qmf-0.18-29.el6.i686.rpm
    MD5: c85da10d85140d2f106b64355612eedaSHA-256: 8a39b2fbbbc74cbfa0e72c441544d4985dbedab7d48606449c38ba4c9418ffed
 
x86_64:
cumin-0.1.5797-5.el6.noarch.rpm
    MD5: e9cd4889ff1a8b39a94e8d7e7e13d5b9SHA-256: 8be9b500a9a453f4dc286fdbae946a8ba7bd1df32527fadeb581152b1e721693
python-qpid-qmf-0.18-29.el6.x86_64.rpm
    MD5: 518080184e3e2e30d363bd66b1c999ecSHA-256: f6d8246934b0277e9f725f0ab1504b2280f0879e72b041a051bb0a4092b6c146
qpid-cpp-client-0.18-36.el6.i686.rpm
    MD5: cbb782d6b5472171d34dfe0753af1e7eSHA-256: 4bdcd7200fc4fe88d1e762d9e0595cffa43fe2ee1579caf1168d5c0ba6ace83e
qpid-cpp-client-0.18-36.el6.x86_64.rpm
    MD5: ed449b12c41d39670cb97b7c7a12ecc9SHA-256: 2cacf7f5139b0cb3a3548ec96915b3da9a169cf0ef2e6e1595dcf2749c8c25c1
qpid-cpp-client-devel-0.18-36.el6.x86_64.rpm
    MD5: e1b543df247fcfb8b861a4ab7ad54ae4SHA-256: 58d6db41e13eecf341ece339ada0963a5d609ad26e0299f34a3a9ac6286b7f9e
qpid-cpp-client-devel-docs-0.18-36.el6.noarch.rpm
    MD5: 128c236eda396961ceb91518be735826SHA-256: 452193f99fc0ec50267494763a3a9706067556247f826ac56603403d9621752e
qpid-cpp-client-rdma-0.18-36.el6.x86_64.rpm
    MD5: d4da2f3c118cf5189f3311ccabd66b2cSHA-256: ccf3e4e0d2c0f77849a0d5496e05355c877bcd158f6371f7e0d3cc5c59e15afc
qpid-cpp-client-ssl-0.18-36.el6.i686.rpm
    MD5: c802ad47e3d9102fdcd104fe9ffec898SHA-256: 3b5f26ffdfeb419b685fc2c587ad29969dc545b81aa7f3e77916ade932f4621e
qpid-cpp-client-ssl-0.18-36.el6.x86_64.rpm
    MD5: 732fafa4f1904b203986641825be4b82SHA-256: 8890a94c0fef76d08deffca3b08bcb1d29c64127b7c79285d5aca1efed84d2ec
qpid-cpp-debuginfo-0.18-36.el6.i686.rpm
    MD5: d816a5975e747448b23d27eef7bacc17SHA-256: 7e6a632a86d1fb4b29e37643ca8b16060de95af00d5771ecd6ee31493afbce6f
qpid-cpp-debuginfo-0.18-36.el6.x86_64.rpm
    MD5: 71c2bbc0fb20b5956a4e5dd5ee309ec7SHA-256: b5b91d2a58d31afaac9cb8a7fb4a37ff687127b2dff0c06b7ea9773b5a6ddce3
qpid-cpp-server-0.18-36.el6.i686.rpm
    MD5: c317ac861bb1877fad3c899a543260ddSHA-256: 23fce3bdd6319becd0463c8d3f732b6c3a2fdae494bacaa13b43eef7b968680b
qpid-cpp-server-0.18-36.el6.x86_64.rpm
    MD5: 42846904d55ff32ff11f4ed9c3010c29SHA-256: 21bb37ca3becc384d782c20ee81313d8fef88b5d6f185d3c1c30c90bffbe78a7
qpid-cpp-server-cluster-0.18-36.el6.x86_64.rpm
    MD5: adaef412370c22bb84ccfe07fe9d7f35SHA-256: 28ff239c37fa2889b4878245beeaad05c5afb07c019d0b7896be4c268f5f6627
qpid-cpp-server-devel-0.18-36.el6.x86_64.rpm
    MD5: a438359773d5fb4d67ad3a26a13b8464SHA-256: b8cf90c0431cc1b84d7d00ff1e75045be189219ac786f7d5cf6d559758356786
qpid-cpp-server-rdma-0.18-36.el6.x86_64.rpm
    MD5: ee0eb91942f3d60f08e3743b087e5520SHA-256: 69fc32ab8d76c9177540fe6c17fe36236a8d2cc906e7c5986a6cdfff0175ff53
qpid-cpp-server-ssl-0.18-36.el6.x86_64.rpm
    MD5: bab1f368773ad27ea81e34f2d7a2fbeaSHA-256: a6c0e3802dac4d85422c8bec21a9f8ad8fb46cec4a66b0ce01a59dc73f6e9345
qpid-cpp-server-store-0.18-36.el6.x86_64.rpm
    MD5: 70de3c1d882194d4a76a8125121566f8SHA-256: 8bc739a7788f469363aa7e5a61506b05e3f858c1ca96d12b33ad4519b2d6b287
qpid-cpp-server-xml-0.18-36.el6.x86_64.rpm
    MD5: baf2ce3dad716312cf7fb7cbff0649a6SHA-256: e934c8177ad98fd31cb4161e785afb56e9ddd9ff4a27890b4193e246b5372bb4
qpid-java-client-0.18-9.el6.noarch.rpm
    MD5: 767278d0189444442270ef2c2a2509e8SHA-256: de2214482fb3487ce0635ffc9ac84634e0a0bdf5b809b2a5c5349402a751352b
qpid-java-common-0.18-9.el6.noarch.rpm
    MD5: 997017707e3f82587c0fc1d7f1a34053SHA-256: 2cab5347474aee2c1d6f2ae1b804cafc12a813a69a514e40b35e3ed905b0e447
qpid-java-example-0.18-9.el6.noarch.rpm
    MD5: 3815c6c77727612c560dace918cac543SHA-256: 01b53244d9767c4c7d70dbed0a35e6a3acde286b8df707582d1676c8ba6040eb
qpid-qmf-0.18-29.el6.i686.rpm
    MD5: b04881ba73e425dd13d6fbe117d4d6f8SHA-256: 5636dd5db3b8a03d5dd486d3a29bcfe17a0a70d0340f44bfee0ebe7f11e4f27a
qpid-qmf-0.18-29.el6.x86_64.rpm
    MD5: c44d45cdcab79ff9fe9b3194c0e0a6a9SHA-256: 72d05af12ae8d83c8aecf6ec296568fa40c2c28ec5150c6c936ca23b48e5084e
qpid-qmf-debuginfo-0.18-29.el6.i686.rpm
    MD5: 076218aca8c1a522c991c3f5d86e270dSHA-256: 4c7b96711301782bf64d5ab8449fb1068b7b21de21b28f6730a37b5a97258de2
qpid-qmf-debuginfo-0.18-29.el6.x86_64.rpm
    MD5: 0795024155f699b7a454271622ff11dfSHA-256: 2dcf5c33255d18cbb13884cc29b9f16b22cd882c007afd097d22ac0056705dbe
qpid-qmf-devel-0.18-29.el6.x86_64.rpm
    MD5: 7426bdd45bd9288e3b6e558214cad728SHA-256: 442579c606761fb8e65c1186b0f2f4f88253a8bb55cb8bc1f35e20f8edacc77e
ruby-qpid-qmf-0.18-29.el6.x86_64.rpm
    MD5: 0a08759a622e31f7ad727bf99a32eb97SHA-256: 6d9fdde03ccd23cc57f27bb01c919cc63d299aa7edbc4868a7428c8261866c96
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply